Is it really compatible iphone3gs ver.4.1 to ios 6.1.3
i cant use my phone now because i upgrade it to ios 6.1.3 and it shows that it is not compatible.how can i put it back ?
You can't downgrade that is not supported by Apple. when you say it is not compatible what is happening?
Similar Messages
-
Is this power adapter (12W) really compatible with iPod shuffle?
Hello,
I'm just wondering if the 12W power adapter is really compatible with the iPod shuffle 4th generation.
(http://store.apple.com/us/product/MD836LL/A/apple-12w-usb-power-adapter?fnode=74)
It says it is compatible, but it doesn't make sense to me. Because iPod shuffle is so tiny, I fear that it would burn out if I plug it into a 12W. I understand that the 5W version is compatible but 12W seems interesting.
What do you think? Do you use 12W for the iPod shuffle, too?It works fine and will not damage the Shuffle. The Shuffle will draw only the power it requires.
-
I get the message ''iPad could not be updated because the firmware file is not compatible" when I try to update iOS 5.1 to 5.1.1 using the downloaded iPad3,2_5.1.1_9B206_Restore.ipsw file.
Thanks. But I have no access to Wi-fi & internet connection is very slow here.Then what can I do?
Please help.... -
XCelsius 2008 is not backward compatible with ver 4.5
Post Author: Joseph
CA Forum: Xcelsius and Live Office
I tried opening a project that was done with ver 4.5 but it just said that "Crystal Xcelsius is unable to load this file. This file may be corrupt or may have features that cannot be supported by this version of Crystal Xcelsius." So i guess I probably have to recreate the project in the 2008 version to take advantage of the new features available. So I imported the excel datasheet used in the old project to a new project in Xcelsius 2008 and tried recreating the objects from scratch. I had started with an accordion menu and two list boxes and then I decided to export to swf to test. However, the result was disappointing. I could only see the two list boxes but not the accordion menu. There was a message saying "Initializing..." that stayed. Does this mean I have to recreate the excel data from scratch as well?Post Author: abrat
CA Forum: Xcelsius and Live Office
X2008 is backward compatible with CX4.5. But Jim is correct. There is a bug in X2008 which prevents it from opening some 4.5 models by double-clicking on the filename. They can be opened from the File > Open menu. This only affects opening the model.Due to the many changes between CX4.5 and X2008, the migration of old CX4.5 models is not clean. Differences will be seen. Most are cosmetic affecting only the look of the model. But some tidy up, color changes and re-alignment work must be done. There was no way to gain the benefits of X2008 and still keep CX4.5 models unchanged.Andy -
Is "pages" app really compatible to word .doc files?
i tried opening word files with the pages yet it said that it was not compatible. i then had to open the file with another app in other to see it. i made a new file with pages and sent it via my email. i was not able to open it with the microsoft documents yet the description of the app said that it was compatible. How is this?
What version of Pages?
What version of Word?
What was the file format?
You didn't send a .pages file to the PC?
PCs do not have Pages and can not open .pages files. You need to Export to Word .doc instead.
Peter -
Was pleased to find a fix for making my computer remember passwords, but NOT pleased to find that it is not compatible with my FF 34.05! How do I fix this or even go back to a previous version? Noticed that on some sites, the Password Remembering KEY does not show, particularly on Banking sites, so no option to save anyhow!
What fix are you talking about?
Current Firefox versions should offer to remember passwords regardless of the presence of autocomplete=off.
Firefox won't offer to remember a password when you are in Private Browsing mode.
Did you make sure that there aren't any exceptions?
You can inspect and manage permissions for the domain in the currently selected tab via these steps:
*Click the "[[Site Identity Button|Site Identity Button]]" (globe/padlock) on the location/address bar
*Click "More Information" to open "Tools > Page Info" with the Security tab selected
*Go to the Permissions tab (Tools > Page Info > Permissions) to check the permissions for the domain in the currently selected tab -
Is Drobo REALLY compatible with Lion?
I have a 2nd Gen Drobo (4 Bays with Firewire plug). Ever since upgrading to Lion I have had numerous issues. Super Duper (which was always very dependable) is not backing properly and my computer actually gets frozen quite often. I can usually unfreeze it by unplugging the Drobo. The Drobo website says that it is compatible with Lion and the Drobo Dashboard says that the Firmware is up to date and the drive is healthy, yet I still have problems. My Lion install was a clean install.
Am I alone on this?My Drobo FS is performing no differently under Lion than it did under Snow Leopard. In other words, it's stable but slow as molasses.
Because the FS is a networked drive, though, I'm able to mount it on my desktop through Finder's "Connect to Server" option rather than rely on Drobo Dashboard. I suspect that's what's causing you trouble — on my computers, Drobo Dashboard has never been a stable piece of software.
Hope you're able to figure it out. -
The website is for invoicing and the very large company that has their invoicing on there is not going to upgrade to fix the problem, they say just download a previous version in order to access the site. However, I cannot find on here where to download a previous version of firefox.
The only previous version that is still supported with security updates is Firefox 3.6.x.
All other versions from Firefox 4 till the current Firefox 9.0.1 version are security and stability updates and add new features. It is not recommended to downgrade to such a version.
You can install the portable Firefox 3.6.x version to access websites that do not work with Firefox 5+.
*http://portableapps.com/apps/internet/firefox_portable#legacy
*http://portableapps.com/apps/internet/firefox_portable/localization#legacy36
See also:
*https://support.mozilla.org/kb/Installing+a+previous+version+of+Firefox -
My iphone 5s and model A1457 and even after i downloaded the IOS 7.1,2 itunes get me error "the iphone could not be updated because the firmware file is not compatible"
some people saying that u cant get back and other saying yes u can
i wonder if i still can and how to avoid that error
IOS 8 Drain battery like **** -.-" & wireless not working well -.-", that's so annoying ...
(if someone got a solution, i would appreciate it, Thx in advance)You may have to arrange to take the product into an authorized
service agent for the iPhone (or other affected iDevice) to see
if they can apply the correct firmware update, to help resolve the
issue of upgrade; or if they have a way to put it as it was prior to
the attempted upgrade to a later iOS.
See all worldwide telephone support numbers
Contact a mobile carrier
Find an Apple Authorized Service Provider
Visit an Apple Retail Store
Pending some release of another update to the iOS, you'd need
to have someone's hands-on effort to correct the issues your
product faces now, before another round of upgrade attempt.
Sorry that I have no exact method to attempt to resolve your issue.
Good luck & happy computing! -
need to have software update in my device..iphone3gs...how can i install to my phone and i cant update my phone without software update?
Updating iOS
-
IP-sec site-to-site problem ASA ver 9.1 vs IOS
Hi all,
I'm trying to set up site-to-site vpn between ASA and IOS router, but unsuccessful,
logs are :
1) this end is not behind a nat device
2) Received encrypted packet with no matching SA
the networks are:
172.25.0.0 (inside of ASA) A.A.A.A (outside of ASA) is needed to connect to IOS Router B.B.B.B address with 192.168.1.0 inside network
Below are configs:
ASA:
ASA-5505# sh run
: Saved
ASA Version 9.0(1)
hostname ASA-5505
domain-name 1.kz
names
ip local pool vpn_pool_ASA-5505 192.168.172.2-192.168.172.100 mask 255.255.255.0
ip local pool SAME_NET_ALA 172.25.66.200-172.25.66.210 mask 255.255.255.0
interface Ethernet0/0
switchport access vlan 2
speed 10
interface Ethernet0/1
interface Ethernet0/2
interface Ethernet0/3
interface Ethernet0/4
interface Ethernet0/5
interface Ethernet0/6
interface Ethernet0/7
interface Vlan1
nameif inside
security-level 100
ip address 172.25.66.15 255.255.255.0
interface Vlan2
nameif outside
security-level 0
ip address A.A.A.A 255.255.255.252
ftp mode passive
clock timezone ALMST 6
clock summer-time ALMDT recurring last Sun Mar 0:00 last Sun Oct 0:00
dns server-group DefaultDNS
domain-name 1.kz
same-security-traffic permit inter-interface
same-security-traffic permit intra-interface
object network obj_any
subnet 0.0.0.0 0.0.0.0
object network NETWORK_OBJ_172.25.66.0_24
subnet 172.25.66.0 255.255.255.0
object network NETWORK_OBJ_192.168.172.0_25
subnet 192.168.172.0 255.255.255.128
object network NETWORK_OBJ_172.25.66.192_27
subnet 172.25.66.192 255.255.255.224
object network ALA_office
subnet 192.168.1.0 255.255.255.0
object network NETWORK_OBJ_172.25.0.0_16
subnet 172.25.0.0 255.255.0.0
access-list SAME_NET_ALA_splitTunnelAcl standard permit 172.25.66.0 255.255.255.0
access-list SAME_NET_ALA_splitTunnelAcl standard permit 10.0.0.0 255.0.0.0
access-list SAME_NET_ALA_splitTunnelAcl standard permit 172.0.0.0 255.0.0.0
access-list VPN-OUT-INS extended permit ip 192.168.172.0 255.255.255.0 any log
access-list VPN-IN-INS extended permit ip any any log
access-list VPN-OUT-OUT extended permit ip any 192.168.172.0 255.255.255.0 log
access-list VPN-OUT-ALL standard permit any4
access-list net172 standard permit 172.25.0.0 255.255.0.0
access-list net10 standard permit 10.0.0.0 255.0.0.0
access-list outside_cryptomap extended permit ip object NETWORK_OBJ_172.25.66.0_24 object ALA_office
pager lines 24
logging enable
logging asdm informational
mtu inside 1500
mtu outside 1500
no failover
icmp unreachable rate-limit 1 burst-size 1
icmp permit any inside
no asdm history enable
arp timeout 14400
no arp permit-nonconnected
nat (inside,outside) source static NETWORK_OBJ_172.25.66.0_24 NETWORK_OBJ_172.25.66.0_24 destination static NETWORK_OBJ_192.168.172.0_25 NETWORK_OBJ_192.168.172.0_25 no-proxy-arp route-lookup
nat (inside,outside) source static obj_any obj_any destination static NETWORK_OBJ_172.25.66.192_27 NETWORK_OBJ_172.25.66.192_27 no-proxy-arp route-lookup
nat (inside,outside) source static NETWORK_OBJ_172.25.66.0_24 NETWORK_OBJ_172.25.66.0_24 destination static ALA_office ALA_office no-proxy-arp route-lookup
object network obj_any
nat (inside,outside) dynamic interface
nat (inside,outside) after-auto source dynamic any interface
access-group VPN-IN-INS in interface inside
access-group VPN-IN-INS out interface inside
route outside 0.0.0.0 0.0.0.0 88.204.136.165 1
route inside 10.0.0.0 255.0.0.0 172.25.66.1 2
route inside 172.0.0.0 255.0.0.0 172.25.66.1 1
timeout xlate 3:00:00
timeout pat-xlate 0:00:30
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
timeout floating-conn 0:00:00
dynamic-access-policy-record DfltAccessPolicy
user-identity default-domain LOCAL
aaa authentication ssh console LOCAL
http server enable
http 192.168.1.0 255.255.255.0 inside
http 172.25.66.16 255.255.255.255 inside
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart
crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-AES-128-SHA-TRANS esp-aes esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-128-SHA-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-AES-128-MD5-TRANS esp-aes esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-AES-128-MD5-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-AES-192-SHA-TRANS esp-aes-192 esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-192-SHA-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-AES-192-MD5-TRANS esp-aes-192 esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-AES-192-MD5-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-AES-256-SHA-TRANS esp-aes-256 esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-256-SHA-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-AES-256-MD5-TRANS esp-aes-256 esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-AES-256-MD5-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-3DES-SHA-TRANS esp-3des esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-3DES-SHA-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-3DES-MD5-TRANS esp-3des esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-3DES-MD5-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-DES-SHA-TRANS esp-des esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-DES-SHA-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-DES-MD5-TRANS esp-des esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-DES-MD5-TRANS mode transport
crypto ipsec ikev1 transform-set Alma-set esp-aes esp-sha-hmac
crypto ipsec ikev2 ipsec-proposal DES
protocol esp encryption des
protocol esp integrity sha-1 md5
crypto ipsec ikev2 ipsec-proposal 3DES
protocol esp encryption 3des
protocol esp integrity sha-1 md5
crypto ipsec ikev2 ipsec-proposal AES
protocol esp encryption aes
protocol esp integrity sha-1 md5
crypto ipsec ikev2 ipsec-proposal AES192
protocol esp encryption aes-192
protocol esp integrity sha-1 md5
crypto ipsec ikev2 ipsec-proposal AES256
protocol esp encryption aes-256
protocol esp integrity sha-1 md5
crypto ipsec security-association pmtu-aging infinite
crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs group1
crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5
crypto map outside_map 1 match address outside_cryptomap
crypto map outside_map 1 set peer B.B.B.B
crypto map outside_map 1 set ikev1 transform-set Alma-set
crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP
crypto map outside_map interface outside
crypto map inside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP
crypto map inside_map interface inside
crypto ca trustpool policy
crypto ikev2 policy 1
encryption aes-256
integrity sha
group 5 2
prf sha
lifetime seconds 86400
crypto ikev2 policy 10
encryption aes-192
integrity sha
group 5 2
prf sha
lifetime seconds 86400
crypto ikev2 policy 20
encryption aes
integrity sha
group 5 2
prf sha
lifetime seconds 86400
crypto ikev2 policy 30
encryption 3des
integrity sha
group 5 2
prf sha
lifetime seconds 86400
crypto ikev2 policy 40
encryption des
integrity sha
group 5 2
prf sha
lifetime seconds 86400
crypto ikev2 enable outside
crypto ikev1 enable outside
crypto ikev1 policy 1
authentication pre-share
encryption 3des
hash md5
group 2
lifetime 86400
crypto ikev1 policy 5
authentication pre-share
encryption aes
hash sha
group 2
lifetime 86400
crypto ikev1 policy 10
authentication crack
encryption aes-256
hash sha
group 2
lifetime 86400
crypto ikev1 policy 20
authentication rsa-sig
encryption aes-256
hash sha
group 2
lifetime 86400
crypto ikev1 policy 30
authentication pre-share
encryption aes-256
hash sha
group 2
lifetime 86400
crypto ikev1 policy 40
authentication crack
encryption aes-192
hash sha
group 2
lifetime 86400
crypto ikev1 policy 50
authentication rsa-sig
encryption aes-192
hash sha
group 2
lifetime 86400
crypto ikev1 policy 60
authentication pre-share
encryption aes-192
hash sha
group 2
lifetime 86400
crypto ikev1 policy 70
authentication crack
encryption aes
hash sha
group 2
lifetime 86400
crypto ikev1 policy 80
authentication rsa-sig
encryption aes
hash sha
group 2
lifetime 86400
crypto ikev1 policy 100
authentication crack
encryption 3des
hash sha
group 2
lifetime 86400
crypto ikev1 policy 110
authentication rsa-sig
encryption 3des
hash sha
group 2
lifetime 86400
crypto ikev1 policy 120
authentication pre-share
encryption 3des
hash sha
group 2
lifetime 86400
crypto ikev1 policy 130
authentication crack
encryption des
hash sha
group 2
lifetime 86400
crypto ikev1 policy 140
authentication rsa-sig
encryption des
hash sha
group 2
lifetime 86400
crypto ikev1 policy 150
authentication pre-share
encryption des
hash sha
group 2
lifetime 86400
telnet timeout 5
ssh 0.0.0.0 0.0.0.0 inside
ssh 0.0.0.0 0.0.0.0 outside
ssh timeout 5
console timeout 0
dhcpd auto_config outside
threat-detection basic-threat
threat-detection statistics access-list
no threat-detection statistics tcp-intercept
webvpn
enable outside
no anyconnect-essentials
group-policy web_access internal
group-policy web_access attributes
vpn-tunnel-protocol ssl-clientless
webvpn
url-list value PRTG
group-policy SAME_NET_ALA internal
group-policy SAME_NET_ALA attributes
dns-server value 8.8.8.8
vpn-tunnel-protocol ikev1
split-tunnel-policy tunnelspecified
split-tunnel-network-list value SAME_NET_ALA_splitTunnelAcl
group-policy GroupPolicy1 internal
group-policy GroupPolicy1 attributes
vpn-tunnel-protocol ikev1
group-policy GroupPolicy_to_ALA internal
tunnel-group SAME_NET_ALA type remote-access
tunnel-group SAME_NET_ALA general-attributes
address-pool SAME_NET_ALA
default-group-policy SAME_NET_ALA
tunnel-group SAME_NET_ALA ipsec-attributes
ikev1 pre-shared-key *****
tunnel-group web_access type remote-access
tunnel-group web_access general-attributes
default-group-policy web_access
tunnel-group B.B.B.B type ipsec-l2l
tunnel-group B.B.B.B general-attributes
default-group-policy GroupPolicy1
tunnel-group B.B.B.B ipsec-attributes
ikev1 pre-shared-key *****
class-map inspection_default
match default-inspection-traffic
policy-map type inspect dns preset_dns_map
parameters
message-length maximum client auto
message-length maximum 512
policy-map global_policy
class inspection_default
inspect dns preset_dns_map
inspect ftp
inspect h323 h225
inspect h323 ras
inspect ip-options
inspect netbios
inspect rsh
inspect rtsp
inspect skinny
inspect esmtp
inspect sqlnet
inspect sunrpc
inspect tftp
inspect sip
inspect xdmcp
inspect icmp
inspect http
prompt hostname context
no call-home reporting anonymous
Cryptochecksum:932099620805dc22d9e48a5e04314887
: end
and IOS Router:
R1921_center#sh run
Building configuration...
Current configuration : 6881 bytes
! Last configuration change at 12:22:45 UTC Fri Aug 29 2014 by yerzhan
version 15.2
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
hostname R1921_center
boot-start-marker
boot-end-marker
logging buffered 51200 warnings
aaa new-model
aaa authentication login userauthen local
aaa authorization network groupauthor local
aaa session-id common
ip cef
ip domain name yourdomain.com
no ipv6 cef
multilink bundle-name authenticated
crypto pki trustpoint TP-self-signed-260502430
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-260502430
revocation-check none
rsakeypair TP-self-signed-260502430
crypto pki certificate chain TP-self-signed-260502430
certificate self-signed 01
30820229 30820192 A0030201 02020101 300D0609 2A864886 F70D0101 05050030
30312E30 2C060355 04031325 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 32363035 30323433 30301E17 0D313331 31323630 35343131
355A170D 32303031 30313030 30303030 5A303031 2E302C06 03550403 1325494F
532D5365 6C662D53 69676E65 642D4365 72746966 69636174 652D3236 30353032
34333030 819F300D 06092A86 4886F70D 01010105 0003818D 00308189 02818100
C178A16C 26637A32 E2FE6EB2 DE63FC5D 2F4096D2 1A223CAF 52A122A1 F152F0E0
D2305008 FA312D36 E055D09C 730111B6 487A01D5 629F8DE4 42FF0444 4B3B107A
F6439BA2 970EFE71 C9127F72 F93603E0 11B3F622 73DB1D7C 1889D57C 88C3B141
ED39B0EA 377CE1F7 610F9C76 FC9C843F A81AEFFE 07917A4B 2946032B 207160B9
02030100 01A35330 51300F06 03551D13 0101FF04 05300301 01FF301F 0603551D
23041830 1680146B B9F671FA BDD822DF 76802EEA 161D18D6 9B8C4030 1D060355
1D0E0416 04146BB9 F671FABD D822DF76 802EEA16 1D18D69B 8C40300D 06092A86
4886F70D 01010505 00038181 00B0C56F F1F4F85C 5FE7BF24 27D1DF41 7E9BB9CE
0447910A 07209827 E780FA0D 3A969CD0 12929830 14AAA496 0D17F684 7F841261
56365D9C AA15019C ABC74D0A 3CD4E002 F63AA181 B3CC4461 4E56E58D C8237899
29F48CFA 67C4B84B 95D456C3 F0CF858D 43C758C3 C285FEF1 C002E2C5 DCFB9A8A
6A1DF7E3 EE675EAF 7A608FB7 88
quit
license udi pid CISCO1921/K9 sn FCZ1748C14U
redundancy
crypto isakmp policy 1
encr 3des
hash md5
authentication pre-share
group 2
crypto isakmp policy 3
encr 3des
authentication pre-share
group 2
crypto isakmp policy 5
encr aes 256
authentication pre-share
group 2
crypto isakmp key PSK-KEY address A.A.A.A
crypto isakmp key 6 PSK-KEY address 0.0.0.0
crypto isakmp client configuration group ALA-EMP-VPN
key *.*.*.*
dns 8.8.8.8
domain cisco.com
pool ippool
acl 101
netmask 255.255.255.0
crypto ipsec transform-set dmvpn_alad esp-3des esp-md5-hmac
mode transport
crypto ipsec transform-set myset esp-3des esp-md5-hmac
mode tunnel
crypto ipsec transform-set TRIPSECMAX esp-3des esp-md5-hmac
mode transport
crypto ipsec transform-set AES-SHA esp-aes esp-sha-hmac
mode tunnel
crypto ipsec profile MAXPROFILE
set transform-set TRIPSECMAX
crypto ipsec profile dmvpn_profile
set transform-set dmvpn_alad
crypto dynamic-map dynmap 10
set transform-set myset
reverse-route
crypto map clientmap client authentication list userauthen
crypto map clientmap isakmp authorization list groupauthor
crypto map clientmap client configuration address respond
crypto map clientmap 20 ipsec-isakmp
set peer A.A.A.A
set transform-set AES-SHA
match address VPN_ASA_PAV
interface Loopback1
ip address 10.10.10.10 255.255.255.255
interface Tunnel2
ip address 192.168.101.1 255.255.255.240
no ip redirects
ip nhrp authentication NHRPMAX
ip nhrp map multicast dynamic
ip nhrp network-id 4679
ip ospf network broadcast
ip ospf hello-interval 30
ip ospf priority 10
tunnel source GigabitEthernet0/1
tunnel mode gre multipoint
tunnel key 4679
interface Embedded-Service-Engine0/0
no ip address
shutdown
interface GigabitEthernet0/0
description to_LAN
ip address 192.168.1.253 255.255.255.0
ip nat inside
ip virtual-reassembly in
duplex auto
speed auto
interface GigabitEthernet0/1
description to_ISP
ip address B.B.B.B 255.255.255.252
ip nat outside
ip virtual-reassembly in
duplex auto
speed auto
crypto map clientmap
router ospf 100
auto-cost reference-bandwidth 1000
area 0 authentication message-digest
area 192.168.1.0 authentication message-digest
redistribute static subnets
passive-interface default
no passive-interface Tunnel1
network 10.10.10.10 0.0.0.0 area 192.168.1.0
network 192.168.1.0 0.0.0.255 area 192.168.1.0
network 192.168.222.0 0.0.0.15 area 0
router ospf 1
router-id 1.1.1.1
redistribute static subnets
passive-interface default
no passive-interface Tunnel2
network 10.10.10.10 0.0.0.0 area 192.168.1.0
network 192.168.1.0 0.0.0.255 area 192.168.1.0
network 192.168.101.0 0.0.0.15 area 0
ip local pool ippool 192.168.33.1 192.168.33.20
ip forward-protocol nd
ip http server
ip http access-class 23
ip http authentication local
ip http secure-server
ip http timeout-policy idle 60 life 86400 requests 10000
ip nat inside source list 111 interface GigabitEthernet0/1 overload
ip nat inside source static tcp 192.168.1.11 22 B.B.B.B 8022 extendable
ip route 0.0.0.0 0.0.0.0 B.B.B.C
ip access-list extended ACL-NAT
deny ip 192.168.1.0 0.0.0.255 172.25.0.0 0.0.255.255
permit ip any any
ip access-list extended ACL-VPN
permit ip 192.168.1.0 0.0.0.255 172.25.0.0 0.0.255.255
ip access-list extended VPN_ASA_PAV
permit ip 192.168.1.0 0.0.0.255 172.25.66.0 0.0.0.255
access-list 101 permit ip 192.168.1.0 0.0.0.255 192.168.33.0 0.0.0.255
access-list 111 deny ip 192.168.1.0 0.0.0.255 192.168.33.0 0.0.0.255
access-list 111 permit ip any any
control-plane
line con 0
line aux 0
line 2
no activation-character
no exec
transport preferred none
transport output pad telnet rlogin lapb-ta mop udptn v120 ssh
stopbits 1
line vty 0 4
exec-timeout 0 0
privilege level 15
transport input telnet ssh
line vty 5 15
exec-timeout 0 0
privilege level 15
transport input telnet ssh
scheduler allocate 20000 1000
endDear Richard,
they are mirrorly matches from both sides.
ASA:
access-list outside_cryptomap extended permit ip object NETWORK_OBJ_172.25.66.0_24 object ALA_office
object network NETWORK_OBJ_172.25.66.0_24
subnet 172.25.66.0 255.255.255.0
object network ALA_office
subnet 192.168.1.0 255.255.255.0
IOS:
ip access-list extended VPN_ASA_PAV
permit ip 192.168.1.0 0.0.0.255 172.25.66.0 0.0.0.255 -
Just trying to set up an old i phone 3 with some games and struggling to find some that will run on IOS 4.2.1 that are suitable for younger kids. Any recommendations?
Considering the age of the phone and the fact that app developers have been discontinuing support for most iOS lower than iOS 5.0, it could be very difficult. I just want to warn you of that as you wait for some answers here. I don't have children that play with a separate device anymore. Both of mine are college age and have their own iPhones, so their taste in games would probably not meet yours!
-
Really Slow web surfing through ZBF with IOS Content filter
Edited: attached partial output of "sh policy-map type inspect zone-pair urlfilter"
Hey, all
We have a 1921 router with IOS Content filter subscribsion and it is also configured as ZBF running latest IOS v15.1. End-user keep complaining about slow web surfing. I connected to network and tested myself and found intermittent surfing experience.
For example, access to www.ibm.com or www.cnn.com hangs 7 times of 10 attempts and maybe only loads reasonablly quick in 1-2 time of the 3. This also affects the speed of download from websites.
I have the case openned with Cisco TAC and CCIE checked my configure but nothing caught his eyes...
I decide to post the issue here in case we both missed something:
Current configuration : 18977 bytes
version 15.1
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
hostname abc_1921
boot-start-marker
boot system flash:/c1900-universalk9-mz.SPA.151-4.M4.bin
boot-end-marker
aaa new-model
aaa authentication login default local
aaa authentication login NONE_LOGIN none
aaa authorization exec default local
aaa session-id common
clock timezone AST -4 0
clock summer-time ADT recurring 3 Sun Mar 2:00 2 Sun Nov 2:00
no ipv6 cef
ip source-route
ip auth-proxy max-login-attempts 5
ip admission max-login-attempts 5
ip cef
ip dhcp excluded-address 192.168.1.1 192.168.1.9
ip dhcp excluded-address 192.168.1.111 192.168.1.254
ip dhcp pool DHCPPOOL
import all
network 192.168.1.0 255.255.255.0
domain-name abc.local
dns-server 192.168.10.200 192.168.10.202
netbios-name-server 4.2.2.4
default-router 192.168.1.150
option 202 ip 192.168.1.218
lease 8
ip domain name abc.locol
ip name-server 8.8.8.8
ip name-server 4.2.2.2
ip port-map user-port-1 port tcp 5080
ip port-map user-port-2 port tcp 3389
ip inspect log drop-pkt
multilink bundle-name authenticated
parameter-map type inspect global
log dropped-packets enable
parameter-map type urlfpolicy trend cprepdenyregex0
allow-mode on
block-page message "The website you have accessed is blocked as per corporate policy"
parameter-map type urlf-glob cpaddbnwlocparapermit2
pattern www.alc.ca
pattern www.espn.com
pattern www.bestcarriers.com
pattern www.gulfpacificseafood.com
pattern www.lafermeblackriver.ca
pattern 69.156.240.29
pattern www.tyson.com
pattern www.citybrewery.com
pattern www.canadianbusinessdirectory.ca
pattern www.homedepot.ca
pattern ai.fmcsa.dot.gov
pattern www.mtq.gouv.qc.ca
pattern licenseinfo.oregon.gov
pattern www.summitfoods.com
pattern www.marine-atlantic.ca
pattern www.larway.com
pattern www.rtlmotor.ca
pattern *.abc.com
pattern *.kijiji.ca
pattern *.linkedin.com
pattern *.skype.com
pattern toronto.bluejays.mlb.com
pattern *.gstatic.com
parameter-map type urlf-glob cpaddbnwlocparadeny3
pattern www.facebook.com
pattern www.radiofreecolorado.net
pattern facebook.com
pattern worldofwarcraft.com
pattern identityunknown.net
pattern static.break.com
pattern lyris01.media.com
pattern www.saltofreight.com
pattern reality-check.com
pattern reality-check.ca
parameter-map type ooo global
tcp reassembly timeout 5
tcp reassembly queue length 128
tcp reassembly memory limit 8192
parameter-map type trend-global global-param-map
cache-size maximum-memory 5000
crypto pki token default removal timeout 0
crypto pki trustpoint Equifax_Secure_CA
revocation-check none
crypto pki trustpoint NetworkSolutions_CA
revocation-check none
crypto pki trustpoint trps1_server
revocation-check none
crypto pki trustpoint TP-self-signed-3538579429
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-3538579429
revocation-check none
rsakeypair TP-self-signed-3538579429
!! CERTIFICATE OMITED !!
redundancy
ip ssh version 2
class-map type inspect match-any INCOMING_VPN_TRAFFIC_MAP
match access-group name REMOTE_SITE_SUBNET
class-map type inspect match-all PPTP_GRE_INSPECT_MAP
match access-group name ALLOW_GRE
class-map type inspect match-all INSPECT_SKINNY_MAP
match protocol skinny
class-map type inspect match-all INVALID_SOURCE_MAP
match access-group name INVALID_SOURCE
class-map type inspect match-all ALLOW_PING_MAP
match protocol icmp
class-map type urlfilter match-any cpaddbnwlocclasspermit2
match server-domain urlf-glob cpaddbnwlocparapermit2
class-map type urlfilter match-any cpaddbnwlocclassdeny3
match server-domain urlf-glob cpaddbnwlocparadeny3
class-map type urlfilter trend match-any cpcatdenyclass2
class-map type inspect match-all cpinspectclass1
match protocol http
class-map type inspect match-any CUSTOMIZED_PROTOCOL_216
match protocol citriximaclient
match protocol ica
match protocol http
match protocol https
class-map type inspect match-any INSPECT_SIP_MAP
match protocol sip
class-map type urlfilter trend match-any cptrendclasscatdeny1
match url category Abortion
match url category Activist-Groups
match url category Adult-Mature-Content
match url category Chat-Instant-Messaging
match url category Cult-Occult
match url category Cultural-Institutions
match url category Gambling
match url category Games
match url category Illegal-Drugs
match url category Illegal-Questionable
match url category Internet-Radio-and-TV
match url category Joke-Programs
match url category Military
match url category Nudity
match url category Pay-to-surf
match url category Peer-to-Peer
match url category Personals-Dating
match url category Pornography
match url category Proxy-Avoidance
match url category Sex-education
match url category Social-Networking
match url category Spam
match url category Tasteless
match url category Violence-hate-racism
class-map type inspect match-any INSPECT_PROTOCOLS_MAP
match protocol pptp
match protocol dns
match protocol ftp
match protocol https
match protocol imap
match protocol pop3
match protocol netshow
match protocol shell
match protocol realmedia
match protocol rtsp
match protocol smtp
match protocol sql-net
match protocol streamworks
match protocol tftp
match protocol vdolive
match protocol tcp
match protocol udp
match protocol icmp
class-map type urlfilter trend match-any cptrendclassrepdeny1
match url reputation ADWARE
match url reputation DIALER
match url reputation DISEASE-VECTOR
match url reputation HACKING
match url reputation PASSWORD-CRACKING-APPLICATIONS
match url reputation PHISHING
match url reputation POTENTIALLY-MALICIOUS-SOFTWARE
match url reputation SPYWARE
match url reputation VIRUS-ACCOMPLICE
class-map type inspect match-all CUSTOMIZED_NAT_MAP_1
match access-group name CUSTOMIZED_NAT_1
match protocol user-port-1
class-map type inspect match-all CUSTOMIZED_NAT_MAP_2
match access-group name CUSTOMIZED_NAT_2
match protocol user-port-2
class-map type inspect match-any INSPECT_H323_MAP
match protocol h323
match protocol h323-nxg
match protocol h323-annexe
class-map type inspect match-all INSPECT_H225_MAP
match protocol h225ras
class-map type inspect match-all CUSTOMIZED_216_MAP
match class-map CUSTOMIZED_PROTOCOL_216
match access-group name CUSTOMIZED_NAT_216
policy-map type inspect OUT-IN-INSPECT-POLICY
class type inspect INCOMING_VPN_TRAFFIC_MAP
inspect
class type inspect PPTP_GRE_INSPECT_MAP
pass
class type inspect CUSTOMIZED_NAT_MAP_1
inspect
class type inspect CUSTOMIZED_NAT_MAP_2
inspect
class type inspect CUSTOMIZED_216_MAP
inspect
class class-default
drop
policy-map type inspect urlfilter cppolicymap-1
description Default abc Policy Filter
parameter type urlfpolicy trend cprepdenyregex0
class type urlfilter cpaddbnwlocclasspermit2
allow
class type urlfilter cpaddbnwlocclassdeny3
reset
log
class type urlfilter trend cptrendclasscatdeny1
reset
log
class type urlfilter trend cptrendclassrepdeny1
reset
log
policy-map type inspect IN-OUT-INSPECT-POLICY
class type inspect cpinspectclass1
inspect
service-policy urlfilter cppolicymap-1
class type inspect INSPECT_PROTOCOLS_MAP
inspect
class type inspect INVALID_SOURCE_MAP
inspect
class type inspect INSPECT_SIP_MAP
inspect
class type inspect ALLOW_PING_MAP
inspect
class type inspect INSPECT_SKINNY_MAP
inspect
class type inspect INSPECT_H225_MAP
inspect
class type inspect INSPECT_H323_MAP
inspect
class class-default
drop
zone security inside
description INTERNAL_NETWORK
zone security outside
description PUBLIC_NETWORK
zone-pair security INSIDE_2_OUTSIDE source inside destination outside
service-policy type inspect IN-OUT-INSPECT-POLICY
zone-pair security OUTSIDE_2_INSIDE source outside destination inside
service-policy type inspect OUT-IN-INSPECT-POLICY
crypto isakmp policy 10
encr 3des
authentication pre-share
group 2
crypto isakmp key password address 11.22.3.1
crypto ipsec security-association lifetime seconds 28800
crypto ipsec transform-set TunnelToCold esp-3des
crypto map TunnelsToRemoteSites 10 ipsec-isakmp
set peer 11.22.3.1
set transform-set TunnelToCold
match address TUNNEL_TRAFFIC2Cold
interface Embedded-Service-Engine0/0
no ip address
shutdown
interface GigabitEthernet0/0
description OUTSIDE_INTERFACE
ip address 1.1.1.186 255.255.255.248
ip nat outside
ip virtual-reassembly in
zone-member security outside
duplex full
speed 1000
crypto map TunnelsToRemoteSites
crypto ipsec df-bit clear
interface GigabitEthernet0/1
description INSIDE_INTERFACE
ip address 192.168.1.150 255.255.255.0
ip nat inside
ip virtual-reassembly in
zone-member security inside
duplex full
speed 1000
ip forward-protocol nd
ip http server
ip http access-class 10
ip http authentication local
ip http secure-server
ip nat inside source static tcp 192.168.1.217 5080 interface GigabitEthernet0/0 5080
ip nat inside source route-map NAT_MAP interface GigabitEthernet0/0 overload
ip nat inside source static tcp 192.168.1.216 80 1.1.1.187 80 extendable
ip nat inside source static tcp 192.168.1.216 443 1.1.1.187 443 extendable
ip nat inside source static tcp 192.168.1.216 1494 1.1.1.187 1494 extendable
ip nat inside source static tcp 192.168.1.216 2598 1.1.1.187 2598 extendable
ip nat inside source static tcp 192.168.1.213 3389 1.1.1.187 3390 extendable
ip nat inside source static tcp 192.168.1.216 5080 1.1.1.187 5080 extendable
ip route 0.0.0.0 0.0.0.0 1.1.1.185
ip access-list standard LINE_ACCESS_CONTROL
permit 192.168.1.0 0.0.0.255
ip access-list extended ALLOW_ESP_AH
permit esp any any
permit ahp any any
ip access-list extended ALLOW_GRE
permit gre any any
ip access-list extended CUSTOMIZED_NAT_1
permit ip any host 192.168.1.217
permit ip any host 192.168.1.216
ip access-list extended CUSTOMIZED_NAT_2
permit ip any host 192.168.1.216
permit ip any host 192.168.1.212
permit ip any host 192.168.1.213
ip access-list extended CUSTOMIZED_NAT_216
permit ip any host 192.168.1.216
ip access-list extended INVALID_SOURCE
permit ip host 255.255.255.255 any
permit ip 127.0.0.0 0.255.255.255 any
ip access-list extended NAT_RULES
deny ip 192.168.1.0 0.0.0.255 192.168.2.0 0.0.0.255
deny ip 192.168.1.0 0.0.0.255 192.168.3.0 0.0.0.255
deny ip 192.168.1.0 0.0.0.255 192.168.4.0 0.0.0.255
deny ip 192.168.1.0 0.0.0.255 192.168.5.0 0.0.0.255
deny ip 192.168.1.0 0.0.0.255 192.168.6.0 0.0.0.255
deny ip 192.168.1.0 0.0.0.255 192.168.7.0 0.0.0.255
deny ip 192.168.1.0 0.0.0.255 192.168.8.0 0.0.0.255
deny ip 192.168.1.0 0.0.0.255 192.168.9.0 0.0.0.255
deny ip 192.168.1.0 0.0.0.255 192.168.10.0 0.0.0.255
permit ip 192.168.1.0 0.0.0.255 any
ip access-list extended REMOTE_SITE_SUBNET
permit ip 192.168.2.0 0.0.0.255 192.168.1.0 0.0.0.255
permit ip 192.168.3.0 0.0.0.255 192.168.1.0 0.0.0.255
permit ip 192.168.4.0 0.0.0.255 192.168.1.0 0.0.0.255
permit ip 192.168.5.0 0.0.0.255 192.168.1.0 0.0.0.255
permit ip 192.168.6.0 0.0.0.255 192.168.1.0 0.0.0.255
permit ip 192.168.7.0 0.0.0.255 192.168.1.0 0.0.0.255
permit ip 192.168.8.0 0.0.0.255 192.168.1.0 0.0.0.255
permit ip 192.168.9.0 0.0.0.255 192.168.1.0 0.0.0.255
permit ip 192.168.10.0 0.0.0.255 192.168.1.0 0.0.0.255
ip access-list extended TUNNEL_TRAFFIC2ABM
permit ip 192.168.1.0 0.0.0.255 192.168.10.0 0.0.0.255
ip access-list extended TUNNEL_TRAFFIC2Bridgewater
permit ip 192.168.1.0 0.0.0.255 192.168.8.0 0.0.0.255
ip access-list extended TUNNEL_TRAFFIC2ColdbrookDispatch
permit ip 192.168.1.0 0.0.0.255 192.168.2.0 0.0.0.255
ip access-list extended TUNNEL_TRAFFIC2ColdbrookETL
permit ip 192.168.1.0 0.0.0.255 192.168.7.0 0.0.0.255
ip access-list extended TUNNEL_TRAFFIC2ColdbrookTrailershop
permit ip 192.168.1.0 0.0.0.255 192.168.3.0 0.0.0.255
ip access-list extended TUNNEL_TRAFFIC2Moncton
permit ip 192.168.1.0 0.0.0.255 192.168.6.0 0.0.0.255
ip access-list extended TUNNEL_TRAFFIC2MountPearl
permit ip 192.168.1.0 0.0.0.255 192.168.4.0 0.0.0.255
ip access-list extended TUNNEL_TRAFFIC2Ontoria
permit ip 192.168.1.0 0.0.0.255 192.168.5.0 0.0.0.255
ip access-list extended WEB_TRAFFIC
permit tcp 192.168.1.0 0.0.0.255 any eq www
access-list 10 permit 192.168.1.0 0.0.0.255
route-map NAT_MAP permit 10
match ip address NAT_RULES
snmp-server community 1publicl RO
control-plane
line con 0
logging synchronous
login authentication NONE_LOGIN
line aux 0
line 2
no activation-character
no exec
transport preferred none
transport input all
transport output pad telnet rlogin lapb-ta mop udptn v120 ssh
stopbits 1
line vty 0 4
access-class LINE_ACCESS_CONTROL in
exec-timeout 30 0
logging synchronous
transport input all
scheduler allocate 20000 1000
ntp server 0.ca.pool.ntp.org prefer
ntp server 1.ca.pool.ntp.org
endHi,
I know this is for a different platform but have a look at this link:
https://supportforums.cisco.com/thread/2089462
Read through it to get some idea of the similarity, but in particular note the last entry almost a year after the original post.
I too am having trouble with http inspection, if I do layers 3 & 4 inspection there is no issue whatsoever, but as soon as I enable layer 7 inspection then I have intermittent browsing issues.
The easy solution here is to leave it at layers 3 & 4, which doesn't give you the flixibility to do cool things like blocking websites, IM, regex expression matching etc... but in my opinion I just don't think these routers can handle it.
It appears to be a hit and miss affair, and going on the last post from the above link, you might be better off in having the unit replaced under warranty.
The alternative is wasting a lot of time and effort and impacting your users to get something up and running that in the end is so flaky that you have no confidence in the solution and you are then in a situation where ALL future issues users are facing MIGHT be because of this layer 7 inspection bug/hardware issue etc?
I would recommend you use the router as a frontline firewall with inbound/outbound acl's (no inspection), and then invest a few $ in getting an ASA dedicated firewall (but that's just me ) -
when i swipe down my home screen on iPhone 6 it says ''SEARCH iPhone'' instead it should say ''Spotlight Search'' don't know what's the issue. i'm on iOS 8.1 but this problem was there when i was on stock 8.0
According to my device, if you have Spotlight Suggestions and Bing Web Results turned on in Settings>General>Spotlight Search, it will show "Spotlight Search". If you have them turned off, it will show "Search iPhone".
If you have those two options turned on, try toggling them off and then back on again and see if that clears it up. If it doesn't, try resetting your device (nothing will be lost): Hold down the Home and Power buttons at the same time and continue to hold them down until the Apple appears. Once the Slide to Unlock screen displays, go to your Home screen and try the Spotlight search again.
Cheers,
GB -
Are some apps just not compatible with iTunes 10.5/iOS 5.0?
Seems some apps on my iPod, conflict with iTunes 10.5.
I started having the Store issue, which ALWAYS showed and worked, never had trouble accessing, never got a blank page... that started happening.
(I think live search when typing is a bad idea)
I had added back a few, by download and via iTunes, but next time I connected iPod, there was problem with iPod showing as a device, and with iTunes Store.
Removed the 4 apps I had added/reinstalled, and now back to normal.
Skype, RockMelt, iCab Mobile, Reeder, Transphotos
I don't know if it was the combination or if it was Skype or photo retouch/editing or one of the others.
I use to have 4.1GB "Other" also and that is now a more comfortable 1.1GB of space.
NY Times "newstand" would not work on 4.3.5, or would but could not by synched, could not be moved to another iPod screen. So basically broken and may have led to other problems. These apps that work with iOS 5 but are not backward compatible, or the reverse situation, they aren't really 5.0 compatible.
For me, I have to wait for Windows and iTunes to settle down, then connect iPod only. And when the iPod device would "vanish". Now where are the "dot one" patched bug-fix verfsions?
And for those still on 4.3.5 and earlier, where is the means to keep and not update to a new version believing it will be backward compatible (and maybe the specs said "iOS 4+" when it should say it reqquires "Newstand and iOS 5+".Mounting a device in iTunes 10.5 with some incompatible apps will cause the device to unmount (disappear) from iTunes. Remove the offending app from the device before you next connect to iTunes and should now mount and stay mounted. Restart AMS if needed.
New app that I put on iPhone will cause this. iPhone no longer shows in iTunes: Devices.
click on "Devices" in iTunes
drop down list of categories
Suggest for features:
Keep prior version in iTunes backup library
Version, when installed or updated
When in Apps, have option to go to product page directly. Easier and more likely to provide feedback.
When in iTunes Store and in Apps, search would by default look first and foremost in App Store section.
iTunes Store Category: iOS 5 Apps.
Some are iOS 5 only and not backward compatible.
Those should not be offered.
Some say that they are iOS 4.x and later but are no longer.
NYTimes now requires Newstand and 5.0 (I wrote and don't think they tested or were aware it wasn't backward or would not synch under iTunes 10.5). Was the prime reason I even upgraded to iOS 5, too! ouch. iTunes 10.5 as tested vs as it actually is - differed and has significant impact. So give developers more access & time to test and certify against 10.5 before offering iOS 5. Why the rush instead of have a smoother rollout? it gets old afterawhile and looks rushed.
For now, be careful. It is hard to know what is compatible, and what to avoid even now, or especially now with the updates from Friday 28th.
Uninstalling an app may be one way to "troubleshoot" but that also removes settings, and requires more work to authorize, customize, and setup again.
Where is chkdsk for iOS?
Last, does an app crashing or freezing corrupt the settings? the app itself? memory? leave behind "other" storage addresses that can't be used until fixed by remvoing and restoring not just app, but everything?
Maybe you are looking for
-
When I click in the search area and choose a google search (taskbar), it returns with a bogus "Özel Arama" The url is: http://www.google.com/cse?cx=partner-pub-9588033570232632:rhmyra-cwbb&q=%22%C3%96zel+Arama%22+%22is+pissing+me+off%22&ie=utf-8&oe=u
-
Controlling from internal order
can anybody help about internal order and how costing will be done based on that internal order.we are a construction company.we want to issue the materials based on internal order. At the end of the project, we want to come to know about the issues
-
Hi, Recently I was browsing through the apple pages when i found this. What's happening to MobileMe? The core services provided by MobileMe have been rewritten to work seamlessly with iCloud. MobileMe will no longer be available as a paid sync servic
-
Hello, We have just installed Oracle VM from the 2.1.1 iso image and the install went fine but now when we try to ftp files to the server we get serious I/O errors starting with "SCSI offset overrun detected resetting bus". After this we get a bunch
-
I have configured our LDAP and turned on the quarantine access for users. I have tested and it works! Yeah..... well for people on the same subnet as he C300. The C300 is on a 10.x.x.x subnet and so is everyone at this location but those that are on